VU23217 Assessment 2 Solved
VU23217 Assessment 2 Solved
VU23217 Assessment 2 Solved
Assessment Date
Student Statement: This assessment is my own work. Any ideas and comments made by other people have been
acknowledged. I understand that by emailing or submitting this assessment electronically, I agree to this statement.
PRIVACY DISCLAIMER: CIT is collecting your personal information for assessment purposes. The information will only
be used in accordance with the CIT Privacy Policy.
Assessor Feedback (also complete observation checklist and questions on the last page)
Note from Assessor: Please record any reasonable adjustment that has occurred for this assessment.
In this assessment, you are required to complete three tasks, which include multiple choice and short answers questions
Materials provided:
• Assessment documentation,
• BYOD
• Access to eLearn and learning resources
• Internet
• MS Word
Information for students: You may have two (2) attempts for this assessment.
If your first attempt is not successful, your teacher will discuss your results with you and will arrange a second
attempt.
Only one re-assessment attempt will be granted for each assessment item.
TASK 1
1.1 What is the National Institute of Standards and Technology (NIST) cyber security framework and what are its
functions? How can it assist organisations to protect themselves from cyber threats? (max 150 words)
Answer: The National Institute of Standards and Technology (NIST) cybersecurity framework is a set of guidelines,
standards, and best practices to manage and reduce cybersecurity risks for organizations. It functions by providing a
structured approach to identify, protect, detect, respond, and recover from cybersecurity threats. It assists
organizations in protecting themselves by offering a common language to communicate about cybersecurity,
assessing and managing risks, and establishing a foundation for better cybersecurity practices.
1.2 Define/explain each of the following terminologies in your own words: (max 50 words each)
b) Threat Actors
Individuals, groups, or organizations responsible for executing cyber-attacks.
c) Threat Vectors
Paths or methods through which threats gain access to systems.
d) Threat Goals
Objectives pursued by threat actors in a cyber-attack.
f) Firewall
A security barrier that filters incoming and outgoing network traffic.
g) Gateway
A point where two different networks connect and data is transferred.
h) Botnets
Networks of compromised computers controlled by attackers for malicious purposes.
i) Cyber Kill chain
Phases of a cyber-attack from reconnaissance to exfiltration.
TASK 2
Scenario:
Consider your office where you may have a computer, telephone, smart board, TV monitor or Multi-Functional Devices
(e.g. printer, scanner, fax). You perform daily activities on your computer such as, reading, writing and sending emails. You
also prepare reports and notes using Microsoft office packages and several other software applications as required by the
workplace.
We can protect personal device and data from threats easily by applying security measures. For example, enforcing a
strong password mechanism. Passwords are widely used to enforce authentication techniques to protect personal devices
and accounts.
Attackers will use many techniques to learn users’ passwords and gain unauthorised access to a resource or data. To
protect and safeguard your personal devices and information, it is important to understand what makes a strong password
and how to store it securely. You can also protect personal and sensitive data for privacy purposes by creating password-
protected files. In addition, it is also good practice to know about malware. Malware is sometimes designed to take your
personal data, so it is good to identify, block, and remove them.
2.1 Strong passwords have four main requirements listed in order of importance:
Based on the list above, the first requirement is probably the most important because you need to be able to remember
your password. For example, the password #4ssFrX^- aartPOknx25_70!xAdk<d! is considered a strong password because it
satisfies the last three requirements, but it is very difficult to remember.
Many organisations require passwords to contain a combination of numbers, symbols, and lower and upper case letters.
Passwords that conform to that policy are fine as long as they are easy for the user to remember.
A good way to create strong passwords is to choose four or more random words and string them together. The password
televisionfrogbootschurch is stronger than J0n@than#81. Notice that while the second password is in compliance with the
policies described above, password cracker programs are very efficient at guessing that type of password. While many
password policy sets will not accept the first password, televisionfrogbootschurch, which is much stronger than the
second. It is easier for the user to remember (especially if associated with an image), it is very long and its random factor
makes it hard for password crackers to guess it.
Using an online password creation tool, create passwords based on the common company password policy set described
above.
Steps
2.2 Protecting the personal data for privacy access and gaining a good logical access control.
1. Open a Microsoft word document and write something in it. Next, create a password for that file and save it to
your desktop. Please provide screenshots of the steps you perform.
2. Place the document in a folder. Share this this folder with someone. Then, change the permissions for the shared
user to only be able to see ‘List folder contents’ and ‘Read’ for this shared folder. Please provide screen capture of
the steps you perform.
3. Open the document and unlock it by entering the correct password. Please provide screen capture of the steps
you performed.
2.3 Follow the below steps to check whether your computer can identify any suspicious files such as malware. (note
that this file will not cause any harm to your computer, it is a simple trial task).
2. If a message does not appear, you can consider that the machine needs attention from a security perspective (e.g.
installing or updating your anti-virus software or Operating System). Take a screen capture of this case and put it
here.
TASK 3
Scenario:
WIDGET accounting is a small company located in Belconnen in the ACT. They have 15 employees, including an Office
Manager and the Business Owner. Ten of the employees work onsite at the office, whilst the remaining five work remotely
from home or at a client’s premises. Responsibility for ICT resides with their Office Manager, who is working their way
through a TAFE ICT course in their spare time.
• All the staff use laptops with Windows 10 Pro as the SOE. These are all standard licenses, are patched and do NOT
have security software installed. Staff are free to choose their own passwords for their individual machines.
• The business has recently moved to the Office 365 Business subscription service for Microsoft Office applications.
• Wireless internet access for office staff is provided via ADSL using a D-Link-2740B wireless router and the Wi-Fi
password is publicly available. Staff are permitted to connect their mobiles, laptops and other electronic devices
through this wireless network. They also can form an internet-of-things structure by connecting these devices at
the same time for work purposes.
• Wired network and internet access is also provided by a recently installed NETGEAR JGS524 24-Port Gigabit
Switch. There are 20 network jacks available, which can be used to connect any physical computing devices.
Couple of jacks are located in the public area of the office accessible to clients and visitors.
• Staff working remotely use either their personal mobile phones as hot spots or their home internet connections
to connect to the internet, and they do not have any password policy enforced.
• Sensitive data is stored on laptops, servers and the NAS without using cryptographic techniques.
• Employees share passwords and logins with each other if they are having difficulty logging in or they need to
access to material on other machines.
3.1 a) Define how the components of WIDGET’S infrastructure in relation to data, networks, machines, users and
applications are interconnected with each other. Also, Identify 3 security gaps for WIDGET’s infrastructure.
Ans: Components are interconnected in WIDGET's infrastructure through laptops, wireless and wired
networks, internet services, and shared data storage. Security gaps include lack of security software, weak
password policies, and sharing of passwords.
b) Please draw a simple diagram to demonstrate how the components are interconnected with each other.
Ans: Create a diagram showcasing laptops, wireless router, wired switch, internet, and connections. Indicate
the security gaps.
3.2 a) Identify 3 security gaps for WIDGET’s infrastructure that makes the devices or components vulnerable.
Ans: Security gaps include lack of security software, weak password policies, and sharing of passwords.
b) Pick one of the above and identify what steps the company could take to protect their physical infrastructure
in the future? Evaluate your steps by explaining how your steps mitigate the risks.
3.3 Explain Why would it be important that WIDGET need a professional cyber security officer on staff? (max 150
words)
Ans: Having a professional cybersecurity officer is vital for WIDGET because they can: